ManagementHardwareIdentitytheftVideoconferencingProgramProcessingComputeraideddesignComputerVirusMemorySmartcardsOperatingSystemSoftwareScannersDisplacedworkersComputerNetworkPresentationSoftwareComputerLiteracyEcommerceSpreadsheetsoftwareDatabaseMarketingOutputComputerSystemWhiteCollarCrimeIntranetInputRecordManagementSystemTelecommutingPiracyDatabaseSoftwareInternalDataSourcesManagementHardwareIdentitytheftVideoconferencingProgramProcessingComputeraideddesignComputerVirusMemorySmartcardsOperatingSystemSoftwareScannersDisplacedworkersComputerNetworkPresentationSoftwareComputerLiteracyEcommerceSpreadsheetsoftwareDatabaseMarketingOutputComputerSystemWhiteCollarCrimeIntranetInputRecordManagementSystemTelecommutingPiracyDatabaseSoftwareInternalDataSources

Unit 6 Chapter 5 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
N
3
B
4
I
5
O
6
G
7
O
8
N
9
G
10
B
11
B
12
I
13
N
14
N
15
I
16
B
17
I
18
B
19
G
20
N
21
I
22
G
23
G
24
O
25
O
26
O
27
B
28
O
29
G
  1. I-Management
  2. N-Hardware
  3. B-Identity theft
  4. I-Videoconferencing
  5. O-Program
  6. G-Processing
  7. O-Computer aided design
  8. N-Computer Virus
  9. G-Memory
  10. B-Smartcards
  11. B-Operating System Software
  12. I-Scanners
  13. N-Displaced workers
  14. N-Computer Network
  15. I-Presentation Software
  16. B-Computer Literacy
  17. I-Ecommerce
  18. B-Spreadsheet software
  19. G-Database Marketing
  20. N-Output
  21. I-Computer System
  22. G-White Collar Crime
  23. G-Intranet
  24. O-Input
  25. O-Record Management System
  26. O-Telecommuting
  27. B-Piracy
  28. O-Database Software
  29. G-Internal Data Sources